Sciweavers

406 search results - page 34 / 82
» The Computation and Application of the Generalized Inverse v...
Sort
View
KDD
2006
ACM
164views Data Mining» more  KDD 2006»
16 years 27 days ago
Assessing data mining results via swap randomization
The problem of assessing the significance of data mining results on high-dimensional 0?1 data sets has been studied extensively in the literature. For problems such as mining freq...
Aristides Gionis, Heikki Mannila, Panayiotis Tsapa...
TEI
2010
ACM
106views Hardware» more  TEI 2010»
15 years 7 months ago
Towards tabletop interaction with everyday artifacts via pressure imaging
Tangible user interfaces enable the interaction with digital information through the physical world. For the binding of physical representations with the underlying digital inform...
Clemens Holzmann, Andreas Hader
115
Voted
CASES
2010
ACM
14 years 10 months ago
Low cost multicast authentication via validity voting in time-triggered embedded control networks
Wired embedded networks must include multicast authentication to prevent masquerade attacks within the network. However, unique constraints for these networks make most existing m...
Christopher Szilagyi, Philip Koopman
222
Voted
COSIT
2011
Springer
322views GIS» more  COSIT 2011»
14 years 9 days ago
CLP(QS): A Declarative Spatial Reasoning Framework
Abstract. We propose CLP(QS), a declarative spatial reasoning framework capable of representing and reasoning about high-level, qualitative spatial knowledge about the world. We sy...
Mehul Bhatt, Jae Hee Lee, Carl Schultz
95
Voted
NCA
2005
IEEE
15 years 6 months ago
C-CORE: Using Communication Cores for High Performance Network Services
Recent hardware advances are creating multi-core systems with heterogeneous functionality. This paper explores how applications and middleware can utilize systems comprised of pro...
Sanjay Kumar, Ada Gavrilovska, Karsten Schwan, Sri...